ResearchSpace

Encryption using finger-code generated from fingerprints

Show simple item record

dc.contributor.author Ntshangase, Cynthia S
dc.contributor.author Shabalala, Meshack B
dc.date.accessioned 2018-10-01T10:13:28Z
dc.date.available 2018-10-01T10:13:28Z
dc.date.issued 2018-03
dc.identifier.citation Ntshangase, C.S. and Shabalala, M.B. 2018. Encryption using finger-code generated from fingerprints. 2018 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 8-9 March 2018 en_US
dc.identifier.isbn 978-1-5386-1001-5
dc.identifier.isbn 978-1-5386-1000-8
dc.identifier.uri https://ieeexplore.ieee.org/document/8368743/
dc.identifier.uri DOI: 10.1109/ICTAS.2018.8368743
dc.identifier.uri http://hdl.handle.net/10204/10429
dc.description Copyright: 2018 IEEE. Due to copyright restrictions, the attached PDF file contains the accepted version of the published paper. For access to the published item, please consult the publisher's website (https://ieeexplore.ieee.org/document/8368743/) en_US
dc.description.abstract In this paper, the literature survey of different algorithms for generating encryption keys using fingerprints is presented. The focus is on fingerprint features called minutiae points where fingerprint ridges end or bifurcate. Minutiae points require less memory and are processed faster than other fingerprint features. In addition, presented is the proposed efficient method for cryptographic key generation using finger-codes. The results show that the length of the key, computing time and the memory it requires is efficient for use as a biometric key or even as a password during verification and authentication. en_US
dc.language.iso en en_US
dc.publisher Encryption using finger-code generated from fingerprints en_US
dc.relation.ispartofseries Worklist;21353
dc.subject Cryptography en_US
dc.subject Fingerprint en_US
dc.subject Finger-code en_US
dc.subject Minutiae en_US
dc.title Encryption using finger-code generated from fingerprints en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Ntshangase, C. S., & Shabalala, M. B. (2018). Encryption using finger-code generated from fingerprints. Encryption using finger-code generated from fingerprints. http://hdl.handle.net/10204/10429 en_ZA
dc.identifier.chicagocitation Ntshangase, Cynthia S, and Meshack B Shabalala. "Encryption using finger-code generated from fingerprints." (2018): http://hdl.handle.net/10204/10429 en_ZA
dc.identifier.vancouvercitation Ntshangase CS, Shabalala MB, Encryption using finger-code generated from fingerprints; Encryption using finger-code generated from fingerprints; 2018. http://hdl.handle.net/10204/10429 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Ntshangase, Cynthia S AU - Shabalala, Meshack B AB - In this paper, the literature survey of different algorithms for generating encryption keys using fingerprints is presented. The focus is on fingerprint features called minutiae points where fingerprint ridges end or bifurcate. Minutiae points require less memory and are processed faster than other fingerprint features. In addition, presented is the proposed efficient method for cryptographic key generation using finger-codes. The results show that the length of the key, computing time and the memory it requires is efficient for use as a biometric key or even as a password during verification and authentication. DA - 2018-03 DB - ResearchSpace DP - CSIR KW - Cryptography KW - Fingerprint KW - Finger-code KW - Minutiae LK - https://researchspace.csir.co.za PY - 2018 SM - 978-1-5386-1001-5 SM - 978-1-5386-1000-8 T1 - Encryption using finger-code generated from fingerprints TI - Encryption using finger-code generated from fingerprints UR - http://hdl.handle.net/10204/10429 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record